The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Intrusion detection technology aimed at identifying hidden illegal intrusion by the analysis of network traffic. To an attacker, if he wants to send malicious code to a protected host in the internal network, he has to firstly evade the detection of the intrusion detection system (IDS). The IDS evasion techniques enable IDS produce omission or misstatement, can greatly increase the probability of...
The rise in recent years, the grid is a resource-sharing technology, but in their current state of development and implementation has not been as successful as hoped in engendering distributed environment. One of important reasons which reduce the utilization of grid resources is that the resources services discoveries are not effective. This paper proposes a novel grid service discovery algorithm...
Delay tolerant network, because of the unreliability of the link, and the limit of the network resources, needs to select the appropriate data forwarding algorithm to ensure efficient message forwarding and delivery. According to DTN properties, this article first establishes the DTN two-layered mobility model. Then it introduces node's location, direction of movement and other important parameters...
In dynamic Grid virtual organizations, domains involved must agree upon cross-domain access control policies for their shared resources. Currently, almost all access control mechanisms in Grid security can not support collaborative privilege management. In this paper, we propose a negotiation-based cross-domain access control mechanism, which can be divided into two stages: multi-domain negotiation...
Security policy is the core to ensure the system operating safely, security policy conflict will cause the system to suffer a security threaten, which even make system crash, therefore security policy conflict detection is particularly important. This paper researches the type of intra-node security policy conflict detection, analyses the complexity of algorithm of security policy conflict detection,...
Policy specification is a difficulty in policy-based management recently. This paper analyzes the common policy specification approaches and summarizes the definition of policy in the references. Then, we propose the concept of policy primitive language by defining that policy is a set of policy elements. Meanwhile, formalizing policy and policy primitive language, we prove the applicability of specifying...
Policy monitoring is one of the most indispensable parts in the security policy management, which can improve the reliability of the system and offer the references to the other audit after some security incidentspsila occurrences. In this paper, the policy states are divided into several types. Also the policy states transition model based on the Mealy automata is promoted, which provides the objects...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.